Threat Encyclopedia



This indicates an attack attempt to exploit a Memory Corruption Vulnerability in Foxit Software PhantomPDF
A remote attacker could exploit this vulnerability by enticing a user to open a crafted PDF document. Successful exploitation could allow the attacker to execute arbitrary code in the context of the application.

Affected Products

Foxit Software Foxit Reader and earlier
Foxit Software PhantomPDF and earlier


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor:

CVE References